wpa_supplicant PEAP problem

Dieses Thema im Forum "Installation & Basiskonfiguration" wurde erstellt von BehindTheScenes, 13.05.2009.

  1. #1 BehindTheScenes, 13.05.2009
    BehindTheScenes

    BehindTheScenes Mitglied

    Dabei seit:
    17.10.2006
    Beiträge:
    38
    Zustimmungen:
    0
    Hallo,

    ich habe meinen Laptop paar wochen nicht benutzt und habe Jetzt Linux neu installiert. Jedoch läuft W-Lan in der Uni nicht, bei mir zuhause alles problemlos. Die configs sind die gleichen, auch die Zertifikate:

    hier die Logs:

    Code:
    <anh@lappi> ~] $ sudo wpa_supplicant -D wext -i wlan0 -c /etc/wpa_supplicant.conf 
    
    CTRL-EVENT-SCAN-RESULTS 
    Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
    Associated with 00:12:da:ae:73:81
    CTRL-EVENT-EAP-STARTED EAP authentication started
    CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
    OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
    EAP-TLV: TLV Result - Failure
    CTRL-EVENT-EAP-FAILURE EAP authentication failed
    Authentication with 00:12:da:ae:73:81 timed out.
    CTRL-EVENT-SCAN-RESULTS 
    Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    ioctl[SIOCSIWENCODEEXT]: No such file or directory
    Associated with 00:12:da:ae:73:81
    CTRL-EVENT-EAP-STARTED EAP authentication started
    CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
    OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
    EAP-TLV: TLV Result - Failure
    CTRL-EVENT-EAP-FAILURE EAP authentication failed
    ^CCTRL-EVENT-TERMINATING - signal 2 received
    <anh@lappi> ~] $
    and with -d option:
    Code:
    Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
    Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
    Reading configuration file '/etc/wpa_supplicant.conf'
    Priority group 2
       id=0 ssid='anhHome'
    Priority group 1
       id=1 ssid='ubi'
    Initializing interface (2) 'wlan0'
    SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
      capabilities: key_mgmt 0xf enc 0xf flags 0x0
    WEXT: Operstate: linkmode=1, operstate=5
    Own MAC address: 00:19:d2:71:a9:c9
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_countermeasures
    wpa_driver_wext_set_drop_unencrypted
    RSN: flushing PMKID list in the driver
    Setting scan request: 0 sec 100000 usec
    WPS: UUID based on MAC address - hexdump(len=16): ba f0 4e 66 89 ef 51 d2 99 03 91 ca bd f5 f2 81
    WPS: Build Beacon and Probe Response IEs
    WPS:  * Version
    WPS:  * Wi-Fi Protected Setup State (0)
    WPS:  * Version
    WPS:  * Wi-Fi Protected Setup State (0)
    WPS:  * Response Type (2)
    WPS:  * UUID-E
    WPS:  * Manufacturer
    WPS:  * Model Name
    WPS:  * Model Number
    WPS:  * Serial Number
    WPS:  * Primary Device Type
    WPS:  * Device Name
    WPS:  * Config Methods (0)
    WPS:  * RF Bands (3)
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    Added interface wlan0
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Trying to get current scan results first without requesting a new scan to speed up initial association
    Received 0 bytes of scan results (0 BSSes)
    Cached scan results are empty - not posting
    Selecting BSS from priority group 2
    Try to find WPA-enabled AP
    Try to find non-WPA AP
    Selecting BSS from priority group 1
    Try to find WPA-enabled AP
    Try to find non-WPA AP
    No suitable AP found.
    Setting scan request: 0 sec 0 usec
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 5 seconds
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=8
    Scan results did not fit - trying larger buffer (8192 bytes)
    Received 7142 bytes of scan results (18 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 2
    Try to find WPA-enabled AP
    0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    6: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    7: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    8: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    9: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    10: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    11: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    12: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    13: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    14: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    15: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    16: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    17: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    Try to find non-WPA AP
    0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    6: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    7: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    8: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    9: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    10: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    11: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    12: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    13: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    14: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    15: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    16: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    17: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    Selecting BSS from priority group 1
    Try to find WPA-enabled AP
    0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:12:da:ae:73:81 ssid='ubi'
    Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
    WPA: clearing AP WPA IE
    WPA: set AP RSN IE - hexdump(len=24): 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
    WPA: using GTK CCMP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT 802.1X
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: SCANNING -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c02 len=223
    Association info event
    req_ies - hexdump(len=52): 00 03 75 62 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
    resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RX EAPOL from 00:12:da:ae:73:81
    Setting authentication timeout: 70 sec 0 usec
    EAPOL: Received EAP-Packet frame
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:12:da:ae:73:81
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:12:da:ae:73:81
    No keys have been configured - skip key clearing
    Associated with 00:12:da:ae:73:81
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    EAPOL: startWhen --> 0
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: txStart
    TX EAPOL: dst=00:12:da:ae:73:81
    RX EAPOL from 00:12:da:ae:73:81
    Setting authentication timeout: 70 sec 0 usec
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_PAE entering state RESTART
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
    EAP: EAP entering state IDENTITY
    CTRL-EVENT-EAP-STARTED EAP authentication started
    EAP: EAP-Request Identity data - hexdump_ascii(len=44):
         00 6e 65 74 77 6f 72 6b 69 64 3d 75 62 69 2c 6e   _networkid=ubi,n
         61 73 69 64 3d 73 30 31 2d 77 6c 63 34 34 30 30   asid=s01-wlc4400
         2d 32 2c 70 6f 72 74 69 64 3d 32 39               -2,portid=29    
    EAP: using real identity - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state GET_METHOD
    EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
    TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
    TLS: using phase1 config options
    TLS: Trusted root certificate(s) loaded
    CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
    EAP: EAP entering state METHOD
    SSL: Received packet(len=6) - Flags 0x20
    EAP-PEAP: Start (server ver=0, own ver=1)
    EAP-PEAP: Using PEAP version 0
    SSL: (where=0x10 ret=0x1)
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:before/connect initialization
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write client hello A
    SSL: (where=0x1002 ret=0xffffffff)
    SSL: SSL_connect:error in SSLv3 read server hello A
    SSL: SSL_connect - want more data
    SSL: 95 bytes pending from ssl_out
    SSL: 95 bytes left to be sent out (of total 95 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1010) - Flags 0xc0
    SSL: TLS Message Length: 4710
    SSL: Need 3710 bytes more input data
    SSL: Building ACK (type=25 id=4 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1006) - Flags 0x40
    SSL: Need 2710 bytes more input data
    SSL: Building ACK (type=25 id=5 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1006) - Flags 0x40
    SSL: Need 1710 bytes more input data
    SSL: Building ACK (type=25 id=6 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1006) - Flags 0x40
    SSL: Need 710 bytes more input data
    SSL: Building ACK (type=25 id=7 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=716) - Flags 0x00
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read server hello A
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=3 buf='/C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2'
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=2 buf='/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01'
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/O=Universitaet Bielefeld/CN=CA der Universitaet Bielefeld - G02/emailAddress=hrz-ra@uni-bielefeld.de'
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0 buf='/C=DE/O=Universitaet Bielefeld/CN=radius.uni-bielefeld.de'
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read server certificate A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read server done A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write client key exchange A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write change cipher spec A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write finished A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 flush data
    SSL: (where=0x1002 ret=0xffffffff)
    SSL: SSL_connect:error in SSLv3 read finished A
    SSL: SSL_connect - want more data
    SSL: 318 bytes pending from ssl_out
    SSL: 318 bytes left to be sent out (of total 318 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=61) - Flags 0x80
    SSL: TLS Message Length: 51
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read finished A
    SSL: (where=0x20 ret=0x1)
    SSL: (where=0x1002 ret=0x1)
    SSL: 0 bytes pending from ssl_out
    OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
    SSL: No data to be sent out
    EAP-PEAP: TLS done, proceed to Phase 2
    EAP-PEAP: using label 'client EAP encryption' in key derivation
    EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
    SSL: Building ACK (type=25 id=9 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=35) - Flags 0x00
    EAP-PEAP: received 29 bytes encrypted data for Phase 2
    EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
    EAP-PEAP: received Phase 2: code=1 identifier=10 length=5
    EAP-PEAP: Phase 2 Request: type=1
    EAP: using real identity - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    EAP-PEAP: Encrypting Phase 2 data - hexdump(len=12): [REMOVED]
    SSL: 66 bytes left to be sent out (of total 66 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=59) - Flags 0x00
    EAP-PEAP: received 53 bytes encrypted data for Phase 2
    EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 0b 00 1a 10 d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5 6c 64 61 70 36
    EAP-PEAP: received Phase 2: code=1 identifier=11 length=31
    EAP-PEAP: Phase 2 Request: type=26
    EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
    EAP-MSCHAPV2: RX identifier 11 mschapv2_id 11
    EAP-MSCHAPV2: Received challenge
    EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5):
         6c 64 61 70 36                                    ldap6           
    EAP-MSCHAPV2: Generating Challenge Response
    MSCHAPV2: Identity - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    MSCHAPV2: Username - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    MSCHAPV2: auth_challenge - hexdump(len=16): d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5
    MSCHAPV2: peer_challenge - hexdump(len=16): 1d 5f c6 5a 21 6f 26 19 6d bd 80 00 a3 af 93 01
    MSCHAPV2: username - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    MSCHAPV2: password - hexdump_ascii(len=32): [REMOVED]
    MSCHAPV2: NT Response - hexdump(len=24): 03 98 14 44 ac 9c cf 07 ec 63 94 03 cb e6 17 51 81 6d a2 42 d8 8d 4f 8b
    MSCHAPV2: Auth Response - hexdump(len=20): d3 e9 36 dc c7 f2 a3 35 a6 94 72 7d 6e f1 f2 2d b6 8b 47 7a
    MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
    EAP-MSCHAPV2: TX identifier 11 mschapv2_id 11 (response)
    EAP-PEAP: Encrypting Phase 2 data - hexdump(len=66): [REMOVED]
    SSL: 122 bytes left to be sent out (of total 122 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=43) - Flags 0x00
    EAP-PEAP: received 37 bytes encrypted data for Phase 2
    EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 02
    EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
    EAP-PEAP: Phase 2 Request: type=33
    EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 02
    EAP-TLV: Result TLV - hexdump(len=2): 00 02
    EAP-TLV: TLV Result - Failure
    EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
    SSL: 66 bytes left to be sent out (of total 66 bytes)
    EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Failure
    EAP: EAP entering state FAILURE
    CTRL-EVENT-EAP-FAILURE EAP authentication failed
    EAPOL: SUPP_PAE entering state HELD
    EAPOL: SUPP_BE entering state RECEIVE
    EAPOL: SUPP_BE entering state FAIL
    EAPOL: SUPP_BE entering state IDLE
    EAPOL authentication completed unsuccessfully
    Setting authentication timeout: 2 sec 0 usec
    Authentication with 00:12:da:ae:73:81 timed out.
    Added BSSID 00:12:da:ae:73:81 into blacklist
    wpa_driver_wext_disassociate
    No keys have been configured - skip key clearing
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portValid=0
    Setting scan request: 0 sec 0 usec
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 30 seconds
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    Added BSSID 00:00:00:00:00:00 into blacklist
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    Driver did not support SIOCSIWENCODEEXT
    State: SCANNING -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=8
    Failed to get scan results
    Failed to get scan results - try scanning again
    Setting scan request: 1 sec 0 usec
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=8
    Scan results did not fit - trying larger buffer (8192 bytes)
    Received 8184 bytes of scan results (21 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 2
    Try to find WPA-enabled AP
    0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    4: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    5: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    6: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    7: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    8: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    9: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    10: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    11: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    12: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    13: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    15: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    16: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    17: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    18: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    19: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    Try to find non-WPA AP
    0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    4: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    5: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    6: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    7: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    8: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    9: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    10: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    11: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    12: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    13: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    15: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    16: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    17: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    18: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    19: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    Selecting BSS from priority group 1
    Try to find WPA-enabled AP
    0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:12:da:ae:73:81 ssid='ubi'
    Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
    WPA: clearing AP WPA IE
    WPA: set AP RSN IE - hexdump(len=24): 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
    WPA: using GTK CCMP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT 802.1X
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: DISCONNECTED -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c02 len=223
    Association info event
    req_ies - hexdump(len=52): 00 03 75 62 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
    resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:12:da:ae:73:81
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:12:da:ae:73:81
    No keys have been configured - skip key clearing
    Associated with 00:12:da:ae:73:81
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    EAP: EAP entering state INITIALIZE
    EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
    ENGINE: engine deinit
    EAP: EAP entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RX EAPOL from 00:12:da:ae:73:81
    Setting authentication timeout: 70 sec 0 usec
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_PAE entering state RESTART
    EAP: EAP entering state INITIALIZE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_PAE entering state AUTHENTICATING
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
    EAP: EAP entering state IDENTITY
    CTRL-EVENT-EAP-STARTED EAP authentication started
    EAP: EAP-Request Identity data - hexdump_ascii(len=44):
         00 6e 65 74 77 6f 72 6b 69 64 3d 75 62 69 2c 6e   _networkid=ubi,n
         61 73 69 64 3d 73 30 31 2d 77 6c 63 34 34 30 30   asid=s01-wlc4400
         2d 32 2c 70 6f 72 74 69 64 3d 32 39               -2,portid=29    
    EAP: using real identity - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state GET_METHOD
    EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
    TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
    TLS: using phase1 config options
    TLS: Trusted root certificate(s) loaded
    CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
    EAP: EAP entering state METHOD
    SSL: Received packet(len=6) - Flags 0x20
    EAP-PEAP: Start (server ver=0, own ver=1)
    EAP-PEAP: Using PEAP version 0
    SSL: (where=0x10 ret=0x1)
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:before/connect initialization
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write client hello A
    SSL: (where=0x1002 ret=0xffffffff)
    SSL: SSL_connect:error in SSLv3 read server hello A
    SSL: SSL_connect - want more data
    SSL: 95 bytes pending from ssl_out
    SSL: 95 bytes left to be sent out (of total 95 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1010) - Flags 0xc0
    SSL: TLS Message Length: 4710
    SSL: Need 3710 bytes more input data
    SSL: Building ACK (type=25 id=3 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    EAPOL: startWhen --> 0
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state RETRANSMIT
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1006) - Flags 0x40
    SSL: Need 2710 bytes more input data
    SSL: Building ACK (type=25 id=4 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1006) - Flags 0x40
    SSL: Need 1710 bytes more input data
    SSL: Building ACK (type=25 id=5 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=1006) - Flags 0x40
    SSL: Need 710 bytes more input data
    SSL: Building ACK (type=25 id=6 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=716) - Flags 0x00
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read server hello A
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=3 buf='/C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2'
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=2 buf='/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01'
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/O=Universitaet Bielefeld/CN=CA der Universitaet Bielefeld - G02/emailAddress=hrz-ra@uni-bielefeld.de'
    TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0 buf='/C=DE/O=Universitaet Bielefeld/CN=radius.uni-bielefeld.de'
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read server certificate A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read server done A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write client key exchange A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write change cipher spec A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 write finished A
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 flush data
    SSL: (where=0x1002 ret=0xffffffff)
    SSL: SSL_connect:error in SSLv3 read finished A
    SSL: SSL_connect - want more data
    SSL: 318 bytes pending from ssl_out
    SSL: 318 bytes left to be sent out (of total 318 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=61) - Flags 0x80
    SSL: TLS Message Length: 51
    SSL: (where=0x1001 ret=0x1)
    SSL: SSL_connect:SSLv3 read finished A
    SSL: (where=0x20 ret=0x1)
    SSL: (where=0x1002 ret=0x1)
    SSL: 0 bytes pending from ssl_out
    OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
    SSL: No data to be sent out
    EAP-PEAP: TLS done, proceed to Phase 2
    EAP-PEAP: using label 'client EAP encryption' in key derivation
    EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
    SSL: Building ACK (type=25 id=8 ver=0)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=35) - Flags 0x00
    EAP-PEAP: received 29 bytes encrypted data for Phase 2
    EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
    EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
    EAP-PEAP: Phase 2 Request: type=1
    EAP: using real identity - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    EAP-PEAP: Encrypting Phase 2 data - hexdump(len=12): [REMOVED]
    SSL: 66 bytes left to be sent out (of total 66 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=59) - Flags 0x00
    EAP-PEAP: received 53 bytes encrypted data for Phase 2
    EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 0a 00 1a 10 d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5 6c 64 61 70 36
    EAP-PEAP: received Phase 2: code=1 identifier=10 length=31
    EAP-PEAP: Phase 2 Request: type=26
    EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
    EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10
    EAP-MSCHAPV2: Received challenge
    EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5):
         6c 64 61 70 36                                    ldap6           
    EAP-MSCHAPV2: Generating Challenge Response
    MSCHAPV2: Identity - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    MSCHAPV2: Username - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    MSCHAPV2: auth_challenge - hexdump(len=16): d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5
    MSCHAPV2: peer_challenge - hexdump(len=16): 72 ed a4 b2 77 67 32 3e 85 98 d0 f2 1c 97 7e 49
    MSCHAPV2: username - hexdump_ascii(len=7):
         6d 6b 6f 63 68 32 32                              mkoch22         
    MSCHAPV2: password - hexdump_ascii(len=32): [REMOVED]
    MSCHAPV2: NT Response - hexdump(len=24): 0f 22 e8 1a b7 a9 e5 29 15 46 16 0c c6 c3 4e 36 69 7b e2 2c 47 44 da a6
    MSCHAPV2: Auth Response - hexdump(len=20): 90 15 0d 8d 3a 5e 2f 5f ee af 2f aa 07 01 b7 25 f3 6a 9b 43
    MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
    EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response)
    EAP-PEAP: Encrypting Phase 2 data - hexdump(len=66): [REMOVED]
    SSL: 122 bytes left to be sent out (of total 122 bytes)
    EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
    EAP: EAP entering state METHOD
    SSL: Received packet(len=43) - Flags 0x00
    EAP-PEAP: received 37 bytes encrypted data for Phase 2
    EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0b 00 0b 21 80 03 00 02 00 02
    EAP-PEAP: received Phase 2: code=1 identifier=11 length=11
    EAP-PEAP: Phase 2 Request: type=33
    EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 02
    EAP-TLV: Result TLV - hexdump(len=2): 00 02
    EAP-TLV: TLV Result - Failure
    EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
    SSL: 66 bytes left to be sent out (of total 66 bytes)
    EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
    EAP: EAP entering state SEND_RESPONSE
    EAP: EAP entering state IDLE
    EAPOL: SUPP_BE entering state RESPONSE
    EAPOL: txSuppRsp
    TX EAPOL: dst=00:12:da:ae:73:81
    EAPOL: SUPP_BE entering state RECEIVE
    RX EAPOL from 00:12:da:ae:73:81
    EAPOL: Received EAP-Packet frame
    EAPOL: SUPP_BE entering state REQUEST
    EAPOL: getSuppRsp
    EAP: EAP entering state RECEIVED
    EAP: Received EAP-Failure
    EAP: EAP entering state FAILURE
    CTRL-EVENT-EAP-FAILURE EAP authentication failed
    EAPOL: SUPP_PAE entering state HELD
    EAPOL: SUPP_BE entering state RECEIVE
    EAPOL: SUPP_BE entering state FAIL
    EAPOL: SUPP_BE entering state IDLE
    EAPOL authentication completed unsuccessfully
    Setting authentication timeout: 2 sec 0 usec
    Authentication with 00:12:da:ae:73:81 timed out.
    BSSID 00:12:da:ae:73:81 blacklist count incremented to 2
    wpa_driver_wext_disassociate
    No keys have been configured - skip key clearing
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portValid=0
    Setting scan request: 0 sec 0 usec
    State: DISCONNECTED -> SCANNING
    Starting AP scan (broadcast SSID)
    Scan requested (ret=0) - scan timeout 30 seconds
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:00:00:00:00:00
    BSSID 00:00:00:00:00:00 blacklist count incremented to 2
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    Driver did not support SIOCSIWENCODEEXT
    State: SCANNING -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=8
    Failed to get scan results
    Failed to get scan results - try scanning again
    Setting scan request: 1 sec 0 usec
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b19 len=8
    Scan results did not fit - trying larger buffer (8192 bytes)
    Received 8185 bytes of scan results (21 BSSes)
    CTRL-EVENT-SCAN-RESULTS 
    Selecting BSS from priority group 2
    Try to find WPA-enabled AP
    0: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    1: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    2: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - blacklisted
    3: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    6: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    7: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    8: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    9: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    10: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    11: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    12: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    13: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    15: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    16: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    17: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    18: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    19: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - no WPA/RSN IE
    Try to find non-WPA AP
    0: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    1: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    2: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - blacklisted
    3: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    6: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    7: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       skip - SSID mismatch
    8: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    9: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    10: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    11: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    12: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    13: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    15: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    16: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    17: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    18: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    19: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
       skip - SSID mismatch
    Selecting BSS from priority group 1
    Try to find WPA-enabled AP
    0: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
       selected based on RSN IE
       selected WPA AP 00:12:da:ae:72:11 ssid='ubi'
    Trying to associate with 00:12:da:ae:72:11 (SSID='ubi' freq=2462 MHz)
    Cancelling scan request
    WPA: clearing own WPA/RSN IE
    Automatic auth_alg selection: 0x1
    RSN: using IEEE 802.11i/D9.0
    WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
    WPA: clearing AP WPA IE
    WPA: set AP RSN IE - hexdump(len=24): 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
    WPA: using GTK CCMP
    WPA: using PTK CCMP
    WPA: using KEY_MGMT 802.1X
    WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    No keys have been configured - skip key clearing
    wpa_driver_wext_set_drop_unencrypted
    State: DISCONNECTED -> ASSOCIATING
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_associate
    wpa_driver_wext_set_psk
    Setting authentication timeout: 10 sec 0 usec
    EAPOL: External notification - EAP success=0
    EAPOL: External notification - EAP fail=0
    EAPOL: External notification - portControl=Auto
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RSN: Ignored PMKID candidate without preauth flag
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b04 len=12
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8c02 len=223
    Association info event
    req_ies - hexdump(len=52): 00 03 75 62 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
    resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
    WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
    RX EAPOL from 00:12:da:ae:72:11
    EAPOL: Received EAP-Packet frame
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    Wireless event: cmd=0x8b15 len=20
    Wireless event: new AP: 00:12:da:ae:72:11
    State: ASSOCIATING -> ASSOCIATED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    Associated to a new BSS: BSSID=00:12:da:ae:72:11
    No keys have been configured - skip key clearing
    Associated with 00:12:da:ae:72:11
    WPA: Association event - clear replay counter
    WPA: Clear old PTK
    EAPOL: External notification - portEnabled=0
    EAPOL: External notification - portValid=0
    EAPOL: External notification - portEnabled=1
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: SUPP_BE entering state IDLE
    EAP: EAP entering state INITIALIZE
    EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
    ENGINE: engine deinit
    EAP: EAP entering state IDLE
    Setting authentication timeout: 10 sec 0 usec
    Cancelling scan request
    RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    EAPOL: startWhen --> 0
    EAPOL: SUPP_PAE entering state CONNECTING
    EAPOL: txStart
    TX EAPOL: dst=00:12:da:ae:72:11
    CTRL-EVENT-TERMINATING - signal 2 received
    Removing interface wlan0
    State: ASSOCIATED -> DISCONNECTED
    wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
    WEXT: Operstate: linkmode=-1, operstate=5
    wpa_driver_wext_deauthenticate
    No keys have been configured - skip key clearing
    EAPOL: External notification - portEnabled=0
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: External notification - portValid=0
    wpa_driver_wext_set_wpa
    wpa_driver_wext_set_drop_unencrypted
    wpa_driver_wext_set_countermeasures
    No keys have been configured - skip key clearing
    Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
    Removed BSSID 00:12:da:ae:73:81 from blacklist (clear)
    Cancelling scan request
    Cancelling authentication timeout
    WEXT: Operstate: linkmode=0, operstate=6

    und die wpa_supplicant.conf

    Code:
    network={
    	ssid="anhHome"
    	#psk="XXX"
    	psk=e240a6f7bbafcc2c3...XXX...2e80391
    	priority=2
    }
    network={
    	ssid="ubi"
    	key_mgmt=WPA-EAP
    	eap=PEAP
    	phase2="auth=MSCHAPV2"
    	ca_cert="/etc/ca-certificates/deutsche-telekom-root-ca-2.pem"
    	identity="mkoch22"
    	#password="AXXX"
    	password=ac3049,...XXX...2b9956c0
    	priority=1
    }
    danke schonmal
    mfg
     
  2. Anzeige

    Schau dir mal diese Kategorie an. Dort findest du bestimmt etwas.
    Registrieren bzw. einloggen, um diese und auch andere Anzeigen zu deaktivieren
  3. #2 BehindTheScenes, 14.05.2009
    BehindTheScenes

    BehindTheScenes Mitglied

    Dabei seit:
    17.10.2006
    Beiträge:
    38
    Zustimmungen:
    0
    oke hat sich erledigt....

    Habe das Passwort direct und nich als Hash angegeben und es geht...

    thx

    MfG
     
Thema:

wpa_supplicant PEAP problem

Die Seite wird geladen...

wpa_supplicant PEAP problem - Ähnliche Themen

  1. wpa_supplicant Problem gentoo

    wpa_supplicant Problem gentoo: Moin, nach langem gefriggel läuft meine wlan karte schon fast, nur noch ein prob. mit der wpa_supplicant, ich hoffe allerdings das ihr mir hier...
  2. wpa_supplicant: Fehler bei Initialisierung mit Bootscripts /etc/init.d/net.ath0 start

    wpa_supplicant: Fehler bei Initialisierung mit Bootscripts /etc/init.d/net.ath0 start: Hallo zusammen, ich bin gerade dabei, unter Gentoo mein WLAN einzurichten. Ich habe eine Ubiquiti SRC mit Atheros Chipsatz. Die madwifi-Treiber...
  3. Ubuntu 8.10 - Problem: Wlan mit WPA (wpa_supplicant)

    Ubuntu 8.10 - Problem: Wlan mit WPA (wpa_supplicant): Hallo Zusammen, ich versuche gerade eine WLAN-Verbindung von meinem Samsung P35 (Intel 2200BG Netzwerkkarte) zum Router (Speedport W700V)...
  4. problem mit wpa_supplicant?

    problem mit wpa_supplicant?: hi, mein wpa_supplicant unter ubuntu hardy macht zicken, und ich finde den fehler nicht. ich hab hier mal nen mitschnitt von wpa_supplicant...
  5. wpa_supplicant

    wpa_supplicant: . . .